Skip to main content

Quantum Multi-factor Authentication

  • Conference paper
  • First Online:
Emerging Technologies for Authorization and Authentication (ETAA 2021)

Abstract

We present a quantum multi-factor authentication mechanism based on the hidden-matching quantum communication complexity problem. It offers step-up graded authentication for users via a quantum token. In this paper, we outline the protocol, demonstrate that it can be used in a largely classical setting, explain how it can be implemented in SASL, and discuss arising security features. We also offer a comparison between our mechanism and current state-of-the-art multi-factor authentication mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bar-Yossef, Z., Jayram, T.S., Kerenidis, I.: Exponential separation of quantum and classical one-way communication complexity. In: Proceedings of the 36th ACM Symposium on Theory of Computing, pp. 128–137 (2004)

    Google Scholar 

  2. Barnum, H.N.: Quantum secure identification using entanglement and catalysis. arXiv preprint quant-ph/9910072 (1999)

    Google Scholar 

  3. Bennett, C.H., Brassard, G., Breidbart, S., Wiesner, S.: Quantum cryptography, or unforgeable subway tokens. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 267–275. Springer, Boston (1983). https://doi.org/10.1007/978-1-4757-0602-4_26

    Chapter  Google Scholar 

  4. Dušek, M., Haderka, O., Hendrych, M., Myška, R.: Quantum identification system. Phys. Rev. A 60(1), 149 (1999)

    Article  Google Scholar 

  5. Fhloinn, E.N.: Biometric retrieval of cryptographic keys. Ph.D. thesis, Trinity College Dublin (2006)

    Google Scholar 

  6. Gavinsky, D.: Quantum money with classical verification. In: 2012 IEEE 27th Conference on Computational Complexity, pp. 42–52. IEEE (2012)

    Google Scholar 

  7. Ghilen, A., Azizi, M., Bouallegue, R., Belmabrouk, H.: Quantum authentication based on entangled states. In: Proceedings of the World Congress on Multimedia and Computer Science, pp. 75–78 (2013)

    Google Scholar 

  8. González-Guillén, C.E., González Vasco, M.I., Johnson, F., Pérez del Pozo, Á.L.: An attack on Zawadzki’s quantum authentication scheme. Entropy 23(4), 389 (2021)

    Article  MathSciNet  Google Scholar 

  9. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the 28th ACM Symposium on Theory of Computing, STOC 1996, pp. 212–219. Association for Computing Machinery, New York (1996). https://doi.org/10.1145/237814.237866

  10. Hong, C., Heo, J., Jang, J.G., Kwon, D.: Quantum identity authentication with single photon. Quantum Inf. Process. 16(10), 1–20 (2017). https://doi.org/10.1007/s11128-017-1681-0

    Article  MathSciNet  MATH  Google Scholar 

  11. Kuhn, D.R.: A hybrid authentication protocol using quantum entanglement and symmetric cryptography. arXiv preprint quant-ph/0301150 (2003)

    Google Scholar 

  12. Künnemann, R., Steel, G.: YubiSecure? Formal security analysis results for the Yubikey and YubiHSM. In: Jøsang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 257–272. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38004-4_17

    Chapter  Google Scholar 

  13. Li, X., Barnum, H.: Quantum authentication using entangled states. Int. J. Found. Comput. Sci. 15(04), 609–617 (2004)

    Article  MathSciNet  Google Scholar 

  14. Li, X., Zhang, D.: Quantum information authentication using entangled states. In: International Conference on Digital Telecommunications (ICDT 2006), p. 64. IEEE (2006)

    Google Scholar 

  15. Lomné, V., Roche, T.: A side journey to Titan. IACR Cryptology ePrint Archive 2021/28 (2021)

    Google Scholar 

  16. Mavroeidis, V., Vishi, K., Zych, M.D., Jøsang, A.: The impact of quantum computing on present cryptography. arXiv preprint arXiv:1804.00200 (2018)

  17. Melnikov, A., Zeilenga, K.: Simple authentication and security layer (SASL). IETF RFC 4422 (2006)

    Google Scholar 

  18. Murray, H., Horgan, J., Santos, J.F., Malone, D., Siljak, H.: Implementing a quantum coin scheme. In: 2020 31st Irish Signals and Systems Conference (ISSC), pp. 1–7. IEEE (2020)

    Google Scholar 

  19. M’Raihi, D., Machani, S., Pei, M., Rydell, J.: TOTP: time-based one-time password algorithm. IETF RFC 6238 (2011)

    Google Scholar 

  20. Schneier, B.: NIST is No Longer Recommending Two-Factor Authentication Using SMS, August 2016. https://www.schneier.com/blog/archives/2016/08/nist_is_no_long.html

  21. Sharma, M.K., Nene, M.J.: Two-factor authentication using biometric based quantum operations. Secur. Priv. 3(3), e102 (2020)

    Google Scholar 

  22. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)

    Google Scholar 

  23. Vaughan, A.: Phone number theft through SIM-jacking is on the rise in the UK. New Sci. (3264), 10 (2020). https://www.newscientist.com/article/2228252-phone-number-theft-through-sim-jacking-is-on-the-rise-in-the-uk/. Accessed 4 Jan 2022

  24. Wooters, W., Zurek, W.: Quantum no-cloning theorem. Nature 299, 802 (1982)

    Article  Google Scholar 

  25. Zawadzki, P.: Quantum identity authentication without entanglement. Quantum Inf. Process. 18(1), 1–12 (2018). https://doi.org/10.1007/s11128-018-2124-2

    Article  MathSciNet  MATH  Google Scholar 

  26. Zeng, G., Guo, G.: Quantum authentication protocol. arXiv preprint quant-ph/0001046 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hazel Murray .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Murray, H., Malone, D. (2021). Quantum Multi-factor Authentication. In: Saracino, A., Mori, P. (eds) Emerging Technologies for Authorization and Authentication. ETAA 2021. Lecture Notes in Computer Science(), vol 13136. Springer, Cham. https://doi.org/10.1007/978-3-030-93747-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-93747-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-93746-1

  • Online ISBN: 978-3-030-93747-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics